Harald Welte | e057146 | 2018-02-14 15:42:14 +0100 | [diff] [blame] | 1 | #!/bin/sh |
| 2 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 3 | PIDFILE_PCAP=/tmp/pcap.pid |
| 4 | PIDFILE_NETCAT=/tmp/netcat.pid |
arehbein | bc85a32 | 2022-11-13 18:46:32 +0100 | [diff] [blame] | 5 | FIFO=/tmp/cmderr |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 6 | TESTCASE=$1 |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 7 | VERDICT="$2" |
| 8 | |
arehbein | cf8c450 | 2022-11-13 17:52:48 +0100 | [diff] [blame] | 9 | SUDOSTR="" |
| 10 | if ! [ "$(id -u)" = "0" ]; then |
| 11 | SUDOSTR="sudo -n" |
| 12 | # Otherwise, if sudo /usr/bin/kill, sudo /usr/bin/tcpdump cannot be run without a password prompt, |
| 13 | # and this script will hang indefinitely |
| 14 | fi |
| 15 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 16 | kill_rm_pidfile() { |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 17 | # NOTE: This requires you to be root or something like |
| 18 | # "laforge ALL=NOPASSWD: /usr/sbin/tcpdump, /bin/kill" in your sudoers file |
arehbein | e66c1f8 | 2022-11-28 22:39:21 +0100 | [diff] [blame] | 19 | if [ -e "$1" ]; then |
| 20 | if [ -s "$1" ]; then |
| 21 | $SUDOSTR kill "$(cat "$1")" 2>&1 | grep -v "No such process" |
| 22 | fi |
arehbein | cf8c450 | 2022-11-13 17:52:48 +0100 | [diff] [blame] | 23 | rm $1 |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 24 | fi |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 25 | } |
| 26 | |
Neels Hofmeyr | ced8acf | 2019-02-26 05:03:22 +0100 | [diff] [blame] | 27 | date |
| 28 | |
arehbein | bf45a5c | 2022-11-13 18:48:58 +0100 | [diff] [blame] | 29 | if [ x"$VERDICT" = x"pass" ]; then |
Vadim Yanitskiy | 80726d8 | 2022-12-18 20:36:27 +0700 | [diff] [blame] | 30 | printf "\033[1;32m====== $TESTCASE $VERDICT ======\033[0m\n\n" |
arehbein | bf45a5c | 2022-11-13 18:48:58 +0100 | [diff] [blame] | 31 | else |
Vadim Yanitskiy | 80726d8 | 2022-12-18 20:36:27 +0700 | [diff] [blame] | 32 | printf "\033[1;31m------ $TESTCASE $VERDICT ------\033[0m\n\n" |
Neels Hofmeyr | dadde17 | 2018-06-18 06:18:34 +0200 | [diff] [blame] | 33 | fi |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 34 | |
| 35 | if [ "z$TTCN3_PCAP_PATH" = "z" ]; then |
| 36 | TTCN3_PCAP_PATH=/tmp |
| 37 | fi |
| 38 | |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 39 | # Order the SUT to print a talloc report |
| 40 | if [ "z$OSMO_SUT_HOST" != "z" ] && [ "z$OSMO_SUT_PORT" != "z" ]; then |
| 41 | if [ -x "$(command -v osmo_interact_vty.py)" ]; then |
Oliver Smith | 9678c22 | 2021-12-17 12:04:11 +0100 | [diff] [blame] | 42 | echo "Saving talloc report from $OSMO_SUT_HOST:$OSMO_SUT_PORT to $TESTCASE.talloc" |
| 43 | if ! timeout 5 osmo_interact_vty.py \ |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 44 | -H $OSMO_SUT_HOST -p $OSMO_SUT_PORT \ |
| 45 | -c "en; show talloc-context application full" \ |
Oliver Smith | 9678c22 | 2021-12-17 12:04:11 +0100 | [diff] [blame] | 46 | > "$TTCN3_PCAP_PATH/$TESTCASE.talloc"; then |
| 47 | echo |
| 48 | echo "ERROR: failed to get talloc report via vty" |
| 49 | echo |
| 50 | fi |
Vadim Yanitskiy | 23d6665 | 2021-11-28 21:41:07 +0300 | [diff] [blame] | 51 | else |
| 52 | echo "Missing osmo_interact_vty.py from osmo-python-tests!" |
| 53 | echo " -> Unable to obtain talloc report from the SUT" |
| 54 | fi |
| 55 | fi |
| 56 | |
Max | e521445 | 2019-03-14 18:15:27 +0100 | [diff] [blame] | 57 | # Wait for up to 2 seconds if we keep receiving traffinc from packet dumper, |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 58 | # otherwise we might lose last packets from test. |
| 59 | i=0 |
| 60 | prev_count=-1 |
| 61 | count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap") |
| 62 | while [ $count -gt $prev_count ] && [ $i -lt 2 ] |
| 63 | do |
Max | e521445 | 2019-03-14 18:15:27 +0100 | [diff] [blame] | 64 | echo "Waiting for packet dumper to finish... $i (prev_count=$prev_count, count=$count)" |
Pau Espin Pedrol | dada4c5 | 2018-02-15 16:07:23 +0100 | [diff] [blame] | 65 | sleep 1 |
| 66 | prev_count=$count |
| 67 | count=$(stat --format="%s" "$TTCN3_PCAP_PATH/$TESTCASE.pcap") |
| 68 | i=$((i+1)) |
| 69 | done |
Harald Welte | e057146 | 2018-02-14 15:42:14 +0100 | [diff] [blame] | 70 | |
Pau Espin Pedrol | ad931f2 | 2019-10-02 13:00:51 +0200 | [diff] [blame] | 71 | kill_rm_pidfile "$PIDFILE_PCAP" |
| 72 | kill_rm_pidfile "$PIDFILE_NETCAT" |
arehbein | bc85a32 | 2022-11-13 18:46:32 +0100 | [diff] [blame] | 73 | rm $FIFO |
Vadim Yanitskiy | f949f46 | 2020-07-12 15:49:37 +0700 | [diff] [blame] | 74 | |
Vadim Yanitskiy | eb662c8 | 2020-07-13 05:50:06 +0700 | [diff] [blame] | 75 | gzip -f "$TTCN3_PCAP_PATH/$TESTCASE.pcap" |